CN113128896A - Intelligent workshop management system and method based on Internet of things - Google Patents

Intelligent workshop management system and method based on Internet of things Download PDF

Info

Publication number
CN113128896A
CN113128896A CN202110476196.1A CN202110476196A CN113128896A CN 113128896 A CN113128896 A CN 113128896A CN 202110476196 A CN202110476196 A CN 202110476196A CN 113128896 A CN113128896 A CN 113128896A
Authority
CN
China
Prior art keywords
user
module
identity
pupil
threshold value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110476196.1A
Other languages
Chinese (zh)
Other versions
CN113128896B (en
Inventor
罗昱文
李杨
陈绪林
欧汉文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Arts and Sciences
Original Assignee
Chongqing University of Arts and Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Arts and Sciences filed Critical Chongqing University of Arts and Sciences
Priority to CN202110476196.1A priority Critical patent/CN113128896B/en
Publication of CN113128896A publication Critical patent/CN113128896A/en
Application granted granted Critical
Publication of CN113128896B publication Critical patent/CN113128896B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • G06F3/013Eye tracking input arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/084Backpropagation, e.g. using gradient descent
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/04Manufacturing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris
    • G06V40/193Preprocessing; Feature extraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The invention relates to the technical field of workshop management, in particular to an intelligent workshop management system and method based on the Internet of things. The option generating module generates options according to the daily report of the user, and the options are displayed on a screen; the identity verification module is used for acquiring the real-time motion track of the pupil of the user when the user selects an answer, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user; the mental state detection module is used for acquiring pupil information of the user and detecting the mental state of the user according to the pupil information of the user; the access control opening and closing control module controls the opening and closing of the access control system. The system can strengthen the identity authentication of the user who needs to enter the workshop, and detect the mental state of the user, thereby ensuring the safe operation of the workshop.

Description

Intelligent workshop management system and method based on Internet of things
Technical Field
The invention relates to the technical field of workshop management, in particular to an intelligent workshop management system and method based on the Internet of things.
Background
In the existing production, how to ensure the safe operation of a workshop, especially to prevent irrelevant personnel from entering the workshop, is a crucial point in the production process. The technical means adopted in the prior art usually prompts irrelevant personnel not to enter a workshop through marking marks, but a lot of people can break into the workshop, therefore, the prior art adopts an access control system, the identity information of people who want to enter the workshop is verified through setting passwords, face recognition and the like, the passwords are easy to leak, the face recognition system has large loopholes, the identity of the people who enter the workshop is still difficult to confirm through the control modes, and the irrelevant personnel still can easily think of the method to break into the workshop.
Especially in chemical industry type workshops, the dangerousness of articles in the workshops is high, and strict management and control are needed for personnel entering the workshops. Moreover, the personnel working in such plants need to ensure the care of the operation, otherwise a small error may cause a great risk. Therefore, for personnel entering the workshop, not only the identity of the personnel needs to be more strictly authenticated, but also the mental state of the personnel needs to be detected, so that the safe operation of the workshop is ensured.
Disclosure of Invention
The invention provides an intelligent workshop management system based on the Internet of things, which can strengthen the identity authentication of a user needing to enter a workshop and detect the mental state of the user, thereby ensuring the safe operation of the workshop.
The basic scheme provided by the invention is as follows:
the intelligent workshop management system and method based on the Internet of things comprises a daily newspaper acquisition module, a storage module, an identity recognition module, a daily newspaper acquisition module, an option generation module, an identity verification module, a mental state detection module and an access control opening and closing control module:
the daily report acquisition module: the system is used for collecting daily reports of all users in the workshop;
the storage module: the system is used for storing the identity information of each user in the workshop;
the identity recognition module: the identity recognition module is used for recognizing the identity of the user according to the identity information of each user in the storage module;
the daily newspaper acquisition module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for acquiring a daily report of a user according to the identity of the user;
the option generation module: the system comprises a display screen, a display screen and a display screen, wherein the display screen is used for displaying a daily report of a user;
the identity verification module: the system comprises a user identification module, a user identification module and a user identification module, wherein the user identification module is used for acquiring a real-time motion track of a pupil of the user when the user selects an answer, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user;
the mental state detection module: the system comprises a user interface, a user interface and a user interface, wherein the user interface is used for acquiring pupil information of the user and detecting the mental state of the user according to the pupil information of the user;
entrance guard's switching control module: the access control system is used for controlling the access control system to be opened when the identity authentication module authenticates that the user is the user and the mental state of the user reaches a neutral mental state threshold value; and the identity authentication module controls the access control system to close when the user is not the user or the mental state of the user does not reach a neutral mental state threshold value.
The principle and the advantages of the invention are as follows: the daily newspaper of each user in the workshop is different due to different daily working contents and the daily newspapers of the users are different, so that the probability that irrelevant personnel know the daily newspapers of the users is low, compared with a mode of setting a password in an access control system in the prior art, the daily newspapers of the users are different in the scheme, the daily newspapers of the users are different, the user is familiar with the daily newspaper contents and the working contents and can also inquire through the daily newspaper submitting records when the daily newspapers are unclear, so that options are generated according to the daily newspapers of different users for the corresponding users to select, the safety is higher, the identity authentication of the users is more rigorous and reliable, and if the user is the user, the user cannot remember the daily newspapers of the user, and the current state of the user is not good. In addition, the scheme can acquire the real-time motion track of the pupil when the user selects the answer, so that irrelevant personnel can be prevented from impersonating workers in a workshop by using the static photo of the user. In addition, staff in the workshop, especially staff in the chemical industry class workshop need guarantee good mental state, otherwise error appears in the course of the work easily to lead to serious consequence, so this scheme detects user's mental state on the basis of strengthening the authentication to user, ensures that the user can guarantee going on safely for staff and mental state in the workshop.
Further, identity information includes the fingerprint, the identification module includes fingerprint collection module, fingerprint comparison module and identity confirmation module:
the fingerprint acquisition module: the fingerprint acquisition module is used for acquiring a fingerprint of a user;
the fingerprint comparison module: the fingerprint acquisition module is used for acquiring fingerprints of users and comparing the acquired fingerprints with fingerprints of all users in the storage module to generate a contact ratio;
the identity confirmation module: and when the contact ratio is higher than the contact ratio threshold value, the identity of the user is confirmed.
Has the advantages that: the fingerprint is everyone peculiar identification, has uniqueness and permanence, and the discernment of carrying out user's identity through the fingerprint has the security, and fingerprint identification is more convenient than the trick lock, and the touch can.
Further, the identity verification module comprises an answer judgment module, an option position generation module, a pupil tracking module, a track comparison module and a verification result generation module:
the answer judging module: for determining the accuracy of the answer selected by the user;
the option position generation module: generating the position of the option on the screen;
the pupil tracking module: the system is used for tracking the real-time motion track of the pupil when the user selects an answer;
the track comparison module: the real-time motion track of the pupil of the user is compared with the position of the option on the screen, and the staying time of the pupil of the user at the position of the option is generated;
the verification result generation module: generating a verification result that the user is the user when the answer selected by the user reaches a correct rate threshold value and the stay time reaches a time threshold value; and when the answer selected by the user does not reach the accuracy threshold value or the retention time does not reach the time threshold value, generating a verification result that the user is not the user.
Has the advantages that: the user needs to see the options when selecting the answers, the option position generating module generates the positions of the options on the screen, the pupil tracking module tracks the real-time movement track of the pupil when the user selects the answers, the track comparison module compares the real-time movement track of the pupil of the user with the positions of the options on the screen, and therefore whether the user has the option to answer or not can be judged, irrelevant personnel are prevented from impersonating staff by using dynamic images of staff in a workshop, the staff themselves are guaranteed to answer the questions, and more rigorous and reliable identity authentication of the user can be guaranteed by adopting the scheme.
Further, the identity information also includes facial features of the user when the user opens the eyes and facial features of the user when the user closes the eyes.
Has the advantages that: the identity of the user is identified through various identity information, so that the accuracy of identity identification is improved.
Further, an intelligent workshop management method based on the Internet of things is characterized in that: the method comprises the following steps:
s1: collecting daily reports of all users in a workshop;
s2: storing identity information of each user in the workshop;
s3: identifying the identity of the user according to the stored identity information of each user;
s4: acquiring a daily report of a user according to the identity of the user;
s5: generating options according to the daily report of the user, wherein the options are displayed on a screen;
s6: when the user selects an answer, acquiring a real-time motion track of the pupil of the user, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user;
s7: acquiring pupil information of a user, and detecting the mental state of the user according to the pupil information of the user;
s8: verifying that the user is the user himself, and controlling an access control system to be opened when the mental state of the user reaches a neutral mental state threshold value; and controlling the access control system to close when the user is not the user or the mental state of the user does not reach the neutral mental state threshold value.
Has the advantages that: the daily newspaper of each user in the workshop is different due to different daily working contents and the daily newspapers of the users are different, so that the probability that irrelevant personnel know the daily newspapers of the users is low, compared with a mode of setting a password in an access control system in the prior art, the daily newspapers of the users are different in the scheme, the daily newspapers of the users are different, the user is familiar with the daily newspaper contents and the working contents and can also inquire through the daily newspaper submitting records when the daily newspapers are unclear, so that options are generated according to the daily newspapers of different users for the corresponding users to select, the safety is higher, the identity authentication of the users is more rigorous and reliable, and if the user is the user, the user cannot remember the daily newspapers of the user, and the current state of the user is not good. In addition, the scheme can acquire the real-time motion track of the pupil when the user selects the answer, so that irrelevant personnel can be prevented from impersonating workers in a workshop by using the static photo of the user. In addition, staff in the workshop, especially staff in the chemical industry class workshop need guarantee good mental state, otherwise error appears in the course of the work easily to lead to serious consequence, so this scheme detects user's mental state on the basis of strengthening the authentication to user, ensures that the user can guarantee going on safely for staff and mental state in the workshop.
Further, the identity information includes a fingerprint, and the S3 includes:
s301: collecting a fingerprint of a user;
s302: comparing the collected user fingerprints with the stored user fingerprints respectively to generate a contact ratio;
s303: and when the contact ratio is higher than the contact ratio threshold value, confirming the identity of the user.
Has the advantages that: the fingerprint is everyone peculiar identification, has uniqueness and permanence, and the discernment of carrying out user's identity through the fingerprint has the security, and fingerprint identification is more convenient than the trick lock, and the touch can.
Further, the S6 includes:
s601: judging the accuracy of the answer selected by the user;
s602: generating the position of the option on the screen;
s603: tracking a real-time movement track of a pupil when a user selects an answer;
s604: comparing the real-time movement track of the pupil of the user with the position of the option on the screen to generate the staying time of the pupil of the user at the position of the option;
s605: generating a verification result that the user is the user when the answer selected by the user reaches a correct rate threshold value and the stay time reaches a time threshold value; and when the answer selected by the user does not reach the accuracy threshold value or the retention time does not reach the time threshold value, generating a verification result that the user is not the user.
Has the advantages that: when the user selects the answer, the user needs to see the option, the real-time motion track of the pupil of the user is compared with the position of the option on the screen, so that whether the user has the option to answer or not can be judged, irrelevant personnel are prevented from impersonating staff by using the dynamic image of the staff in a workshop, the staff can answer the question, and the scheme can ensure that the identity authentication of the user is more rigorous and reliable.
Further, the identity information also includes facial features of the user when the user opens the eyes and facial features of the user when the user closes the eyes.
Has the advantages that: the identity of the user is identified through various identity information, and the accuracy of identity identification is improved.
Drawings
Fig. 1 is a logic block diagram of an intelligent workshop management system based on the internet of things according to an embodiment of the invention.
Fig. 2 is a flowchart of an intelligent workshop management method based on the internet of things according to an embodiment of the invention.
Detailed Description
The following is further detailed by way of specific embodiments:
example 1 is substantially as shown in figure 1:
the intelligent workshop management system based on the Internet of things comprises a daily newspaper acquisition module, a storage module, an identity recognition module, a daily newspaper acquisition module, an option generation module, an identity verification module, a mental state detection module and an access control opening and closing control module. The daily newspaper acquisition module is used for acquiring daily newspapers of all users in a workshop; the storage module is used for storing identity information of each user in the workshop, in this embodiment, the identity information is a fingerprint, and in other embodiments of the present application, the identity information may also be facial features of the user when the user opens his eyes and facial features of the user when the user closes his eyes.
The identity recognition module is used for recognizing the identity of the user according to the identity information of each user in the storage module. The identity identification module comprises a fingerprint acquisition module, a fingerprint comparison module and an identity confirmation module. The fingerprint acquisition module is used for acquiring fingerprints of users; the fingerprint comparison module compares the acquired fingerprints of the users with the fingerprints of all the users in the storage module respectively to generate a contact ratio; the identity confirmation module is used for confirming the identity of the user when the contact ratio is higher than the contact ratio threshold value. In this embodiment, the contact ratio is 0% to 100%, and the contact ratio threshold is 90%.
The daily newspaper acquisition module acquires the daily newspaper of the user according to the identity of the user identified by the identity identification module. In this embodiment, the daily report of the user on the last working day is obtained. The option generation module generates options according to the daily report of the last working day of the user, the options are displayed on a screen, and the content of the daily report comprises working content, a working plan and a working summary.
In this embodiment, the option generation module generates three topics, which are the topics of the work content, the work plan, and the work summary in the daily report of the last working day of the user. The specific generation mode is as follows: one keyword in the work plan is extracted, three keywords are randomly generated and are respectively used as four options of a choice question for a user to select the work plan of the previous working day, and the user can be reminded of work required today while the user identity is confirmed. The manner of generating the topics related to the work content and the work summary is the same as the manner of generating the topics related to the work plan, and is not described herein again.
The identity verification module is used for acquiring the real-time motion track of the pupil of the user when the user selects the answer, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user. The identity verification module comprises an answer judgment module, an option position generation module, a pupil tracking module, a track comparison module and a verification result generation module.
The answer judging module is used for judging the accuracy of the answer selected by the user; the option position generating module is used for generating positions of options on a screen, in the embodiment, the options occupy one fourth of the area of the screen, and the positions of the options on the screen are an upper left corner, a lower left corner, an upper right corner and a lower right corner respectively; the pupil tracking module is used for tracking the real-time motion track of the pupil when the user selects an answer; the track comparison module is used for comparing the real-time motion track of the pupil of the user with the position of the option on the screen to generate the staying time of the pupil of the user at the position of the option; the verification result generation module is used for generating a verification result of the user as the user when the answer selected by the user reaches a correct rate threshold value and the retention time reaches a time threshold value; and when the answer selected by the user does not reach the accuracy threshold value or the retention time does not reach the time threshold value, generating a verification result that the user is not the user. In this embodiment, the accuracy threshold 2/3 is a time threshold of 5 seconds.
The mental state detection module is used for acquiring pupil information of the user and detecting the mental state of the user according to the pupil information of the user. In this embodiment, the pupil information is the area of the eyelid covering the pupil and the blinking frequency, the mental state detection module uses the area of the eyelid covering the pupil and the blinking frequency of the user as the input of the input layer and uses the mental state of the user as the output of the output layer in an artificial intelligence manner.
Specifically, a three-layer BP neural network model is constructed firstly, and comprises an input layer, a hidden layer and an output layer, in the embodiment, the input layer has 2 nodes, the output of the output layer has 1 node, in the embodiment, the output mental states of a user include 0-10 from bad to good, and the neutral mental state threshold of the user is 6; for hidden layers, the present embodiment uses the following formula to determine the number of hidden layer nodes:
Figure BDA0003047451670000061
where l is the number of nodes of the hidden layer, n is the number of nodes of the input layer, m is the number of nodes of the output layer, and a is a number between 1 and 10, which is taken as 6 in this embodiment, so that the hidden layer has 8 nodes in total. BP neural networks typically employ Sigmoid differentiable functions and linear functions as the excitation function of the network. This example selects the S-type tangent function tansig as the excitation function for hidden layer neurons. The prediction model selects an S-shaped logarithmic function tansig as an excitation function of neurons of an output layer.
The access control system comprises an access control opening and closing control module, an authentication module and a control module, wherein the access control opening and closing control module is used for controlling the access control system to open when the user is authenticated as the user by the authentication module and the mental state of the user reaches a neutral mental state threshold value; and the identity authentication module controls the access control system to close when the user is not the user or the mental state of the user does not reach a neutral mental state threshold value.
Example 2 is substantially as shown in figure 2:
an intelligent workshop management method based on the Internet of things comprises the following steps:
s1: collecting daily reports of all users in a workshop;
s2: storing identity information of each user in the workshop; in this embodiment, the identity information is a fingerprint, and in other embodiments of the present application, the identity information may also be a facial feature when the user opens the eyes and a facial feature when the user closes the eyes.
S3: identifying the identity of the user according to the stored identity information of each user;
s4: acquiring a daily report of a user according to the identity of the user;
s5: generating options according to the daily report of the user, wherein the options are displayed on a screen;
s6: when the user selects an answer, acquiring a real-time motion track of the pupil of the user, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user;
s7: acquiring pupil information of a user, and detecting the mental state of the user according to the pupil information of the user; in this embodiment, the pupil information is the area of the eyelid covering the pupil and the blinking frequency;
s8: verifying that the user is the user himself, and controlling an access control system to be opened when the mental state of the user reaches a neutral mental state threshold value; and controlling the access control system to close when the user is not the user or the mental state of the user does not reach the neutral mental state threshold value.
Wherein S3 includes S301: collecting a fingerprint of a user;
s302: comparing the collected user fingerprints with the stored user fingerprints respectively to generate a contact ratio; in this embodiment, the degree of overlap comprises 0% to 100%;
s303: when the contact ratio is higher than the contact ratio threshold value, the identity of the user is confirmed; in this embodiment, the threshold value of the contact ratio is 90%.
Specifically, S4 obtains the daily report of the user according to the identified identity of the user. In this embodiment, the daily newspaper of the last working day of the user is acquired, and options are generated according to the daily newspaper of the last working day of the user, where the options are displayed on a screen, and the content of the daily newspaper includes work content, a work plan, and a work summary.
In this embodiment, three topics are formed together, and are topics related to work content, work plan, and work summary in the daily report of the last working day of the user. The specific generation mode is as follows: one keyword in the work plan is extracted, three keywords are randomly generated and are respectively used as four options of a choice question for a user to select the work plan of the previous working day, and the user can be reminded of work required today while the user identity is confirmed. The manner of generating the topics related to the work content and the work summary is the same as the manner of generating the topics related to the work plan, and is not described herein again.
Wherein S6 includes:
s601: judging the accuracy of the answer selected by the user;
s602: generating the position of the option on the screen; in this embodiment, the options occupy one fourth of the area of the screen, and the positions of the options on the screen are the upper left corner, the lower left corner, the upper right corner and the lower right corner respectively;
s603: tracking a real-time movement track of a pupil when a user selects an answer;
s604: comparing the real-time movement track of the pupil of the user with the position of the option on the screen to generate the staying time of the pupil of the user at the position of the option;
s605: generating a verification result that the user is the user when the answer selected by the user reaches a correct rate threshold value and the stay time reaches a time threshold value; and when the answer selected by the user does not reach the accuracy threshold value or the retention time does not reach the time threshold value, generating a verification result that the user is not the user. In this embodiment, the accuracy threshold 2/3 is a time threshold of 5 seconds.
In this embodiment, in S7, the area of the user' S eyelid covering the pupil and the blinking frequency are used as the input of the input layer, and the mental state of the user is used as the output of the output layer. Specifically, a three-layer BP neural network model is constructed firstly, and comprises an input layer, a hidden layer and an output layer, in the embodiment, the input layer has 2 nodes, the output of the output layer has 1 node, in the embodiment, the output mental states of a user include 0-10 from bad to good, and the neutral mental state threshold of the user is 6; for hidden layers, the present embodiment uses the following formula to determine the number of hidden layer nodes:
Figure BDA0003047451670000081
wherein l is the number of nodes of the hidden layer, n is the number of nodes of the input layer, m is the number of nodes of the output layer, a is 1 to 10The number in between is 6 in this embodiment, so the hidden layer has 8 nodes. BP neural networks typically employ Sigmoid differentiable functions and linear functions as the excitation function of the network. This example selects the S-type tangent function tansig as the excitation function for hidden layer neurons. The prediction model selects an S-shaped logarithmic function tansig as an excitation function of neurons of an output layer.
The foregoing are merely exemplary embodiments of the present invention, and no attempt is made to show structural details of the invention in more detail than is necessary for the fundamental understanding of the art, the description taken with the drawings making apparent to those skilled in the art how the several forms of the invention may be embodied in practice with the teachings of the invention. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (8)

1. Wisdom workshop management system based on thing networking, its characterized in that: the system comprises a daily newspaper acquisition module, a storage module, an identity recognition module, a daily newspaper acquisition module, an option generation module, an identity verification module, a mental state detection module and an access control opening and closing control module:
the daily report acquisition module: the system is used for collecting daily reports of all users in the workshop;
the storage module: the system is used for storing the identity information of each user in the workshop;
the identity recognition module: the identity recognition module is used for recognizing the identity of the user according to the identity information of each user in the storage module;
the daily newspaper acquisition module: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for acquiring a daily report of a user according to the identity of the user;
the option generation module: the system comprises a display screen, a display screen and a display screen, wherein the display screen is used for displaying a daily report of a user;
the identity verification module: the system comprises a user identification module, a user identification module and a user identification module, wherein the user identification module is used for acquiring a real-time motion track of a pupil of the user when the user selects an answer, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user;
the mental state detection module: the system comprises a user interface, a user interface and a user interface, wherein the user interface is used for acquiring pupil information of the user and detecting the mental state of the user according to the pupil information of the user;
entrance guard's switching control module: the access control system is used for controlling the access control system to be opened when the identity authentication module authenticates that the user is the user and the mental state of the user reaches a neutral mental state threshold value; and the identity authentication module controls the access control system to close when the user is not the user or the mental state of the user does not reach a neutral mental state threshold value.
2. The intelligent workshop management system based on the internet of things of claim 1, wherein: the identity information comprises a fingerprint, and the identity identification module comprises a fingerprint acquisition module, a fingerprint comparison module and an identity confirmation module:
the fingerprint acquisition module: the fingerprint acquisition module is used for acquiring a fingerprint of a user;
the fingerprint comparison module: the fingerprint acquisition module is used for acquiring fingerprints of users and comparing the acquired fingerprints with fingerprints of all users in the storage module to generate a contact ratio;
the identity confirmation module: and when the contact ratio is higher than the contact ratio threshold value, the identity of the user is confirmed.
3. The intelligent workshop management system based on the internet of things of claim 1, wherein: the identity verification module comprises an answer judgment module, an option position generation module, a pupil tracking module, a track comparison module and a verification result generation module:
the answer judging module: for determining the accuracy of the answer selected by the user;
the option position generation module: generating the position of the option on the screen;
the pupil tracking module: the system is used for tracking the real-time motion track of the pupil when the user selects an answer;
the track comparison module: the real-time motion track of the pupil of the user is compared with the position of the option on the screen, and the staying time of the pupil of the user at the position of the option is generated;
the verification result generation module: generating a verification result that the user is the user when the answer selected by the user reaches a correct rate threshold value and the stay time reaches a time threshold value; and when the answer selected by the user does not reach the accuracy threshold value or the retention time does not reach the time threshold value, generating a verification result that the user is not the user.
4. The intelligent workshop management system based on the internet of things of claim 1, wherein: the identity information also includes facial features of the user when the user is open and facial features of the user when the user is closed.
5. An intelligent workshop management method based on the Internet of things is characterized by comprising the following steps: the method comprises the following steps:
s1: collecting daily reports of all users in a workshop;
s2: storing identity information of each user in the workshop;
s3: identifying the identity of the user according to the stored identity information of each user;
s4: acquiring a daily report of a user according to the identity of the user;
s5: generating options according to the daily report of the user, wherein the options are displayed on a screen;
s6: when the user selects an answer, acquiring a real-time motion track of the pupil of the user, and verifying the identity of the user according to the real-time motion track of the pupil of the user and the answer selected by the user;
s7: acquiring pupil information of a user, and detecting the mental state of the user according to the pupil information of the user;
s8: verifying that the user is the user himself, and controlling an access control system to be opened when the mental state of the user reaches a neutral mental state threshold value; and controlling the access control system to close when the user is not the user or the mental state of the user does not reach the neutral mental state threshold value.
6. The intelligent workshop management method based on the internet of things of claim 5, wherein the intelligent workshop management method comprises the following steps: the identity information includes a fingerprint, and the S3 includes:
s301: collecting a fingerprint of a user;
s302: comparing the collected user fingerprints with the stored user fingerprints respectively to generate a contact ratio;
s303: and when the contact ratio is higher than the contact ratio threshold value, confirming the identity of the user.
7. The intelligent workshop management method based on the internet of things of claim 5, wherein the intelligent workshop management method comprises the following steps: the S6 includes:
s601: judging the accuracy of the answer selected by the user;
s602: generating the position of the option on the screen;
s603: tracking a real-time movement track of a pupil when a user selects an answer;
s604: comparing the real-time movement track of the pupil of the user with the position of the option on the screen to generate the staying time of the pupil of the user at the position of the option;
s605: generating a verification result that the user is the user when the answer selected by the user reaches a correct rate threshold value and the stay time reaches a time threshold value; and when the answer selected by the user does not reach the accuracy threshold value or the retention time does not reach the time threshold value, generating a verification result that the user is not the user.
8. The intelligent workshop management method based on the internet of things of claim 5, wherein the intelligent workshop management method comprises the following steps: the identity information also includes facial features of the user when the user is open and facial features of the user when the user is closed.
CN202110476196.1A 2021-04-29 2021-04-29 Intelligent workshop management system and method based on Internet of things Active CN113128896B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110476196.1A CN113128896B (en) 2021-04-29 2021-04-29 Intelligent workshop management system and method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110476196.1A CN113128896B (en) 2021-04-29 2021-04-29 Intelligent workshop management system and method based on Internet of things

Publications (2)

Publication Number Publication Date
CN113128896A true CN113128896A (en) 2021-07-16
CN113128896B CN113128896B (en) 2023-07-18

Family

ID=76781579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110476196.1A Active CN113128896B (en) 2021-04-29 2021-04-29 Intelligent workshop management system and method based on Internet of things

Country Status (1)

Country Link
CN (1) CN113128896B (en)

Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020097145A1 (en) * 1997-11-06 2002-07-25 David M. Tumey Integrated vehicle security system utilizing facial image verification
WO2004010365A2 (en) * 2002-07-19 2004-01-29 Dicut Inc. Face recognition system and method therefor
US20080104415A1 (en) * 2004-12-06 2008-05-01 Daphna Palti-Wasserman Multivariate Dynamic Biometrics System
WO2008157342A1 (en) * 2007-06-13 2008-12-24 Videntity Systems, Inc. Identity verification and information management
WO2009043047A1 (en) * 2007-09-28 2009-04-02 Eye Controls, Llc Systems and methods for biometric identification
CN102279422A (en) * 2010-06-11 2011-12-14 秦和平 Detection method based on intelligent anti-terrorism safety inspection door device
US20130189661A1 (en) * 2010-06-07 2013-07-25 Affectiva, Inc. Scoring humor reactions to digital media
CN103902046A (en) * 2014-04-10 2014-07-02 深圳市中兴移动通信有限公司 Intelligent prompting method and terminal
JP2014211766A (en) * 2013-04-18 2014-11-13 三菱化学エンジニアリング株式会社 Personnel management system and personnel management method
CN106562793A (en) * 2015-10-08 2017-04-19 松下电器(美国)知识产权公司 Method for controlling information display apparatus, and information display apparatus
US20170161976A1 (en) * 2015-12-07 2017-06-08 Utechzone Co., Ltd. Identity verification method, apparatus and system and non-transitory computer readable medium thereof
CN107393096A (en) * 2017-08-11 2017-11-24 阜阳华润电力有限公司 The control method and access control device of a kind of gate inhibition
CN107464325A (en) * 2017-09-13 2017-12-12 南京信息职业技术学院 A kind of multi-layer gate control system and its implementation
JP2018106435A (en) * 2016-12-27 2018-07-05 清水建設株式会社 Labor Management System
WO2018151758A1 (en) * 2017-02-17 2018-08-23 Whatsapp Inc. Methods and systems for processing an ephemeral content message
CN108830975A (en) * 2018-04-27 2018-11-16 安徽继远软件有限公司 A kind of Intelligent human-face identification gate control system and control method
US20180336286A1 (en) * 2014-04-14 2018-11-22 Netspective Communications Llc Multi-source user generated electronic data integration in a blockchain-based transactional system
CN109272627A (en) * 2018-11-01 2019-01-25 云南昆钢电子信息科技有限公司 A kind of mine down-hole gate inhibition automatic control device
CN208444022U (en) * 2018-07-25 2019-01-29 中控智慧科技股份有限公司 Station is stared in a kind of safety check
CN110197108A (en) * 2018-08-17 2019-09-03 平安科技(深圳)有限公司 Auth method, device, computer equipment and storage medium
CN110390741A (en) * 2018-04-23 2019-10-29 宁波欧依安盾安全科技有限公司 A kind of intelligent access control system
CN110827457A (en) * 2018-07-23 2020-02-21 宁波欧依安盾安全科技有限公司 Virtual access control system based on safety competence identification
CN111832344A (en) * 2019-04-17 2020-10-27 深圳熙卓科技有限公司 Dynamic pupil detection method and device
CN112507315A (en) * 2021-02-05 2021-03-16 红石阳光(北京)科技股份有限公司 Personnel passing detection system based on intelligent brain
US20210287155A1 (en) * 2017-02-28 2021-09-16 Omron Corporation Production management apparatus, method, and program

Patent Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020097145A1 (en) * 1997-11-06 2002-07-25 David M. Tumey Integrated vehicle security system utilizing facial image verification
WO2004010365A2 (en) * 2002-07-19 2004-01-29 Dicut Inc. Face recognition system and method therefor
US20080104415A1 (en) * 2004-12-06 2008-05-01 Daphna Palti-Wasserman Multivariate Dynamic Biometrics System
WO2008157342A1 (en) * 2007-06-13 2008-12-24 Videntity Systems, Inc. Identity verification and information management
WO2009043047A1 (en) * 2007-09-28 2009-04-02 Eye Controls, Llc Systems and methods for biometric identification
US20130189661A1 (en) * 2010-06-07 2013-07-25 Affectiva, Inc. Scoring humor reactions to digital media
CN102279422A (en) * 2010-06-11 2011-12-14 秦和平 Detection method based on intelligent anti-terrorism safety inspection door device
JP2014211766A (en) * 2013-04-18 2014-11-13 三菱化学エンジニアリング株式会社 Personnel management system and personnel management method
CN103902046A (en) * 2014-04-10 2014-07-02 深圳市中兴移动通信有限公司 Intelligent prompting method and terminal
US20180336286A1 (en) * 2014-04-14 2018-11-22 Netspective Communications Llc Multi-source user generated electronic data integration in a blockchain-based transactional system
CN106562793A (en) * 2015-10-08 2017-04-19 松下电器(美国)知识产权公司 Method for controlling information display apparatus, and information display apparatus
US20170161976A1 (en) * 2015-12-07 2017-06-08 Utechzone Co., Ltd. Identity verification method, apparatus and system and non-transitory computer readable medium thereof
JP2018106435A (en) * 2016-12-27 2018-07-05 清水建設株式会社 Labor Management System
WO2018151758A1 (en) * 2017-02-17 2018-08-23 Whatsapp Inc. Methods and systems for processing an ephemeral content message
US20210287155A1 (en) * 2017-02-28 2021-09-16 Omron Corporation Production management apparatus, method, and program
CN107393096A (en) * 2017-08-11 2017-11-24 阜阳华润电力有限公司 The control method and access control device of a kind of gate inhibition
CN107464325A (en) * 2017-09-13 2017-12-12 南京信息职业技术学院 A kind of multi-layer gate control system and its implementation
CN110390741A (en) * 2018-04-23 2019-10-29 宁波欧依安盾安全科技有限公司 A kind of intelligent access control system
CN108830975A (en) * 2018-04-27 2018-11-16 安徽继远软件有限公司 A kind of Intelligent human-face identification gate control system and control method
CN110827457A (en) * 2018-07-23 2020-02-21 宁波欧依安盾安全科技有限公司 Virtual access control system based on safety competence identification
CN208444022U (en) * 2018-07-25 2019-01-29 中控智慧科技股份有限公司 Station is stared in a kind of safety check
CN110197108A (en) * 2018-08-17 2019-09-03 平安科技(深圳)有限公司 Auth method, device, computer equipment and storage medium
CN109272627A (en) * 2018-11-01 2019-01-25 云南昆钢电子信息科技有限公司 A kind of mine down-hole gate inhibition automatic control device
CN111832344A (en) * 2019-04-17 2020-10-27 深圳熙卓科技有限公司 Dynamic pupil detection method and device
CN112507315A (en) * 2021-02-05 2021-03-16 红石阳光(北京)科技股份有限公司 Personnel passing detection system based on intelligent brain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
于兴尚;高晶;: "人工智能视域下图书馆智慧服务探析", 图书馆研究 *

Also Published As

Publication number Publication date
CN113128896B (en) 2023-07-18

Similar Documents

Publication Publication Date Title
Jain et al. An introduction to biometric recognition
US9396319B2 (en) Method of criminal profiling and person identification using cognitive/behavioral biometric fingerprint analysis
CN103634118B (en) Existence authentication method based on card and compound bio feature identification
Ghizlane et al. A new model of automatic and continuous online exam monitoring
CN111540105B (en) Method, system, equipment and storage medium for controlling access control
Das Biometric technology: authentication, biocryptography, and cloud-based architecture
Amaro et al. Evaluation of machine learning techniques for face detection and recognition
Sivaram et al. Biometric security and performance metrics: FAR, FER, CER, FRR
Lai et al. Bridging the gap between forensics and biometric-enabled watchlists for e-borders
JP3590285B2 (en) Biological information recognition device and method
CN113128896B (en) Intelligent workshop management system and method based on Internet of things
Dhir et al. Biometric recognition: A modern era for security
Akhdan et al. Face recognition with anti spoofing eye blink detection
Rosy et al. An enhanced intelligent attendance management system for smart campus
US11238554B2 (en) Frictionless security monitoring and management
Bhandwalkar et al. Continuous user authentication using soft biometric traits for E-learning
Takeda et al. Biometric personal authentication by one step foot pressure distribution change by fuzzy artificial immune system
Bobde et al. Face recognition technology
KR101250633B1 (en) Image based CAPTCHA method and recording medium for program
Raghu et al. Neural network based authentication and verification for web based key stroke dynamics
Martovytskyi et al. Mathematical Model of User Behavior in Computer Systems
Ode-Martins Challenges of Biometrics Technology in Nigeria to Enhance Information Security: A Qualitative Exploratory Case Study
Saidaminkhodja EFFECTIVE METHODS AND ALGORITHMS FOR FACE RECOGNITION BASED ON DEEP LEARNING TECHNOLOGY
Kaluža et al. A probabilistic risk analysis for multimodal entry control
Kadam et al. Contactless Attendance System based on Face Recognition using OpenCv

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant